Wallarm Node supports data masking in requests. The real values will be replaced by * and will not be accessible either in the Wallarm Cloud or in the local post-analysis module. This method ensures that the protected data cannot leak outside the trusted environment.

It can affect the display of attacks, active attack (threat) verification, and the detection of brute force attacks.

Example: Masking of a Cookie Value

If the following conditions take place:

the application is accessible at the domain example.com

the application uses a PHPSESSID cookie for user authentication

security policies deny access to this information for employees using Wallarm

Then, to create a data masking rule for this cookie, the following actions should be performed:

Go to the Rules tab

Find the branch for example.com/**/*.* and click Add rule

Choose Mark as sensitive data

Select the Header parameter and enter its value COOKIE; select the cookie parameter and enter its value PHPSESSID after in this part of request